Homemade cyberweapon worries feds

by
May 25, 2011

By Shaun Waterman-The Washington Times

Two security researchers, working at home in their spare time, have created a cyberweapon similar to the sophisticated Stuxnet computer worm that was discovered last year to have disrupted computer systems running Iran’s nuclear program.

The private efforts by Dillon Beresford and Brian Meixell are raising concerns among U.S. government officials that hackers will launch copycat cyber-attacks that could cripple computer controls at industrial sites such as refineries, dams and power plants.

Officials at the Department of Homeland Security were so distressed by the researchers’ findings that they asked the two men to cancel a planned presentation at a computer security conference in Dallas last week called TakeDownCon.

“They requested that I not share the data, but it was absolutely my decision to cancel,” Mr. Beresford told The Washington Times. Homeland Security “in no way tried to censor the presentation, and the conference organizers were very supportive. … We did the right thing.”

Initial analysis of the 2009 Stuxnet attack on Iran suggested that replicating it would require the resources of a nation-state or large organization and detailed information on how the target computer system was set up. The origin of Stuxnet has not been discovered.

But Mr. Beresford said he developed the cyberweapon “in my bedroom, on my laptop” in 2 1/2 months. The malicious software, or malware, was tested on equipment made by Siemens, the German-based industrial giant that makes the system that was attacked by the Stuxnet worm.

Siemens products – known as industrial control systems – are used in thousands of power stations, chemical plants and other industrial settings worldwide. Stuxnet was designed to make the machinery controlled by an industrial control system destroy itself.

Once Siemens saw Mr. Beresford’s presentation, the company renewed laboratory work on software patches for controllers that were developed after Stuxnet, Mr. Beresford said. He said he worked last week with officials from a special Homeland Security unit in charge of protecting industrial computer programs but was becoming impatient with Siemens‘ response.

“This is another egregious example of a vendor trying to minimize the impact of multiple security vulnerabilities in their products and being somewhat evasive about the truth,” he said, noting that the company tried to downplay concern in its public statements and had yet to publish a fix for the flaws he had found.

“The clock is ticking, and time is of the essence. I expect more from a company worth $80 billion, and so do [their] customers,” Mr. Beresfordsaid.

Siemens spokesman Robert Bartels told The Times that the company is testing fixes and expects to release them “within the next few weeks.”

Homeland Security Department officials asked the researchers to delay their presentation until special repair measures aimed at patching security holes they identified are fully developed. They praised the researchers for postponing public release of data that hackers could use to attack computers that control critical infrastructure around the world.

“Responsible disclosure … does not encourage the release of sensitive vulnerability information without also validating and releasing a solution,” a Homeland Security official said in an email.

To read more, visit: http://www.washingtontimes.com/news/2011/may/24/homemade-cyberweapon-worries-feds/

 

No comments yet - you can be the first!

Leave a Reply

Your email address will not be published. Required fields are marked *

Keep the Fake News Media in check.

Don’t let the MSM censor your news as America becomes Great Again. Over 500,000 Americans receive our daily dose of life, liberty and pursuit of happiness along with Breaking News direct to their inbox—and you can too. Sign up to receive news and views from The 1776Coalition!

We know how important your privacy is and your information is SAFE with us. We’ll never sell
your email address and you can unsubscribe at any time directly from your inbox.
View our full privacy policy.